2023
DOI: 10.3390/s23136181
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks

Abstract: By definition, the aggregating methodology ensures that transmitted data remain visible in clear text in the aggregated units or nodes. Data transmission without encryption is vulnerable to security issues such as data confidentiality, integrity, authentication and attacks by adversaries. On the other hand, encryption at each hop requires extra computation for decrypting, aggregating, and then re-encrypting the data, which results in increased complexity, not only in terms of computation but also due to the re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…While emphasizing data security, their approach does not delve into the distributed processing of encrypted data across the network. Mukesh Kumar et al presented an End-to-End Homomorphic Encryption (EEHE) system for IoT-based WSNs, concentrating on secure data aggregation and the application of aggregator functions on encrypted messages [14]. This study shares a conceptual similarity with our proposed methodology regarding using HE for secure data aggregation.…”
Section: IImentioning
confidence: 93%
“…While emphasizing data security, their approach does not delve into the distributed processing of encrypted data across the network. Mukesh Kumar et al presented an End-to-End Homomorphic Encryption (EEHE) system for IoT-based WSNs, concentrating on secure data aggregation and the application of aggregator functions on encrypted messages [14]. This study shares a conceptual similarity with our proposed methodology regarding using HE for secure data aggregation.…”
Section: IImentioning
confidence: 93%
“…5) Protected identity federation: Establish secure identity federation mechanisms to facilitate seamless authentication and access across multiple IoT domains and environments [10]. Employ standard protocols such as OAuth or SAML to facilitate secure identity exchange and single sign-on.…”
Section: Security and Privacy Framework For Iot Device Identity Manag...mentioning
confidence: 99%